The 1st International Conference on Science of Cyber Security

SciSec 2018

Conference Site: UCAS International Conference Center (Yanqihu Campus, the University of Chinese Academy of Sciences, 380 Huaibeizhuang, Huairou District, Beijing, China)

Conference Date: August, 12 – 14, 2018.

Venue: Academic Hall (1st Floor, Conference Building)

Guidelines of presentation:

(1) Full paper: 25 minutes for each oral paper. 20 minutes for presentation and 5 minutes for question and answer.

(2) Short paper & IJDCF paper: 10 minutes for each short paper. 7 minutes for presentation and 3 minutes for question and answer.

 

August 11, 2018 (Saturday)

17:00-18:00

Registration

18:00-20:00

Welcome Reception

August 12, 2018 (Sunday)

08:30-8:40

Opening Remarks

Professor Feng Liu, Institute of Information Engineering, Chinese Academy of Sciences

08:40-09:40

Invited Lecture I:

Speaker: Professor Moti Yung, Google & Columbia University, USA

Title: The Case for (and against) Science of Security

Session Chair: Professor Shouhuai Xu

09:40-10:20

Conference Group Photo & Coffee Break

10:20-12:00

Full Paper Presentation Session I: Metrics and Measurements (4 papers)

Session Chair: Guangzhi Qu

10:20-10:45

Practical Metrics for Evaluating Anonymous Networks

Zhi Wang, Jinli Zhang, Qixu Liu (Institute of Information Engineering, Chinese Academy of Sciences), Xiang Cui (Cyberspace Institute of Advanced Technology, Guangzhou University) and Junwei Su (Institute of Information Engineering, Chinese Academy of Sciences)

10:45-11:10

Advanced Persistent Distributed Denial of Service Attack Model on Scale-Free Networks

Chunming Zhang, Jingwei Xiao and Junbiao Peng (School of Information Engineering, Guangdong Medical University)

11:10-11:35

Influence of clustering on network robustness against epidemic propagation

Yin-Wei Li, Zhen-Hao Zhang (School of Computer Science , Nanjing University of Posts and Telecommunications), Dongmei Fan, Yu-Rong Song and Guo-Ping Jiang (School of Automation, Nanjing University of Posts and Telecommunications)

11:35-12:00

An Attack Graph Generation Method Based On Parallel Computing

Ningyuan Cao, Kun Lv and Changzhen Hu (Beijing Institute of Technology)

12:00-13:30

Lunch

13:30-15:30

Tutorial:

Professor Shouhuai Xu, University of Texas at San Antonio, USA

Title: Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity

15:30-16:00

Coffee Break

16:00-17:40

Full Paper Presentation Session II: Cybersecurity Dynamics (4 papers)

Session Chair: Professor Guoping Jiang

16:00-16:25

A note on dependence of epidemic threshold on state transition diagram in the SEIC cybersecurity dynamical system model

Hao Qiang and Wenlian Lu (Fudan University)

16:25-16:50

Characterizing the Optimal Attack Strategy in Cyber Epidemic Attack with Limited Resources

Dingyu Yan, Feng Liu, Jia Kun, Yaqin Zhang and Yuantian Zhang (Institute of Information Engineering, Chinese Academy of Sciences)

16:50-17:15

Computer Viruses Propagation Model on Dynamic Switching Networks

Chunming Zhang (School of Information Engineering, Guangdong Medical University)

17:15-18:15

SciSec Business Meeting

Session Chair: Professor Shouhuai Xu

18:15-19:30

Dinner

August 13, 2018 (Monday)

08:30-9:30

Invited Lecture II:

Speaker: Dr. Yuejin Du, Alibaba Group, China

Title: Redefine Cybersecurity

Session Chair: Professor Feng Liu

09:30-10:00

Coffee Break

10:00-11:40

Full Paper Presentation Session III: Attack and Defense (4 papers)

Session Chair: Professor Bo Zeng

10:00-10:25

Security and protection in optical networks

Qingshan Kong, Bo Liu, Ye Wang, and Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences)

10:25-10:50

H-Verifier: Verifying Confidential System State with Delegated Sandboxes

Anyi Liu and Guangzhi Qu (Oakland University)

10:50-11:15

Multi-party quantum key agreement against collective noise

Xiangqian Liang, Shasha Wang, Yonghua Zhang and Guangbao Xu (Shandong University of Science and Technology)

11:15-11:40

An Inducing Localization Scheme for Reactive Jammer in ZigBee Networks

Kuan He and Bin Yu (Zhengzhou Information Science and Technology Institute)

11:40-12:00

Short Paper Presentation Session I: Attack and Defense (2 papers)

Session Chair: Professor Xiaofan Yang

11:40-11:50

New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications

Yexia Cheng (Institute of Information Engineering, Chinese Academy of Sciences), Yuejin Du (Security Department, Alibaba Group), Jin Peng, Shen He, Jun Fu (Department of Security Technology, China Mobile Research Institute), and Baoxu Liu (Institute of Information Engineering, Chinese Academy of Sciences)

11:50-12:00

CyberShip: An SDN-based Autonomic Attack Mitigation Framework for Ship Systems

Rishikesh Sahay, D.A Sepúlveda-Estay, Weizhi Meng, Christian Damsgaard Jensen andMichael Bruhn Barfod (Technical University of Denmark)

12:10-13:30

Lunch

13:30-15:30

Panel Discussion: Study Focus in Science of Cybersecurity

Moderator: Professor Shouhuai Xu

Panelists: Professor Moti Yung, Dr. Yuejin Du, Professor Bo Zeng

15:30-15:45

Break

15:45-16:25

Short Paper Presentation Session II: Attack and Defense (4 papers)

Session Chair: Professor Wenlian Lu

15:45-15:55

Establishing an Optimal Network Defense System: A Monte Carlo Graph Search Method

Zhengyuan Zhang, Kun Lv and Changzhen Hu (Beijing Institute of Technology)

15:55-16:05

Security Concern on Deep Learning Models

Jiaxi Wu, Xiaotong Lin, Yi Tang and Zhiqiang Lin (Guangzhou University)

16:05-16:15

Defending against Advanced Persistent Threat: A Risk Management Perspective

Xiang Zhong (Chongqing University), Lu-Xing Yang (Deakin University), Xiaofan Yang, Qingyu Xiong, Junhao Wen (Chongqing University) and Yuan Yan Tang (University of Macau)

16:15-16:25

Economic-Driven FDI Attack in Electricity Market

Datian Peng, Jianmin Dong, Qinke Peng (Xi'an Jiaotong University), Jianan Jian, Bo Zeng and Zhi-Hong Mao (University of Pittsburgh)

16:25-17:00

Coffee Break

17:00-17:40

IJDCF Paper Presentation Session: Multimedia Security and Cryptology (4 papers)

Session Chair: Professor Ju Liu

17:00-17:10

A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution

Mengmeng Zhang, Rongrong Ni and Yao Zhao (Beijing Jiaotong University)

17:10-17:20

Performance Evaluation and Scheme Selection of Person Re-identification Algorithms in Video Surveillance

Yu Lu (School of Information Science and Engineering, Shandong Agricultural University), Lingchen Gu, Ju Liu (School of Information Science and Engineering, Shandong University) and Peng Lan (School of Information Science and Engineering, Shandong Agricultural University)

17:20-17:30

Applying Horner's Rule to Optimize Lightweight MDS Matrices

Jian Bai, Yao Sun, Ting Li (Institute of Information Engineering, Chinese Academy of Sciences) and Dingkang Wang (Academy of Mathematics and Systems Science, Chinese Academy of Sciences)

17:30-17:40

Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud

Dawei Xie, Haining Yang, Jing Qin (School of Mathematics, Shandong University) and Jixin Ma (School of Computing and Mathematical Sciences, Greenwich University)

18:00-20:30

SciSec 2018 Banquet

Award Ceremony

August 14, 2018 (Tuesday)

8:00-11:30

Social Event

Tour guide: Kun Jia

Sightseeing of the Hongluo Temple

12:00-13:30

Lunch

SciSec 2018 Adjourns